Journal of Artificial Intelligence Practice最新文献

筛选
英文 中文
On Data Analysis and Design and Implementation of Data Preprocessing Scheme Based on Low-quality Rock Datasets 基于低质量岩石数据集的数据分析与预处理方案的设计与实现
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2022.050208
Quan Hao
{"title":"On Data Analysis and Design and Implementation of Data Preprocessing Scheme Based on Low-quality Rock Datasets","authors":"Quan Hao","doi":"10.23977/jaip.2022.050208","DOIUrl":"https://doi.org/10.23977/jaip.2022.050208","url":null,"abstract":": With fast progress of deep learning technology, breakthroughs are achieved in many industries by virtue of efficient artificial intelligence models. In addition, computer hardware is cheaper, which makes it easier to acquire an excellent deep learning model. However, output of a model with good generalization rests with not only powerful hardware computing speed, but also quality of dataset involved in the calculation. Unfortunately, high-quality dataset is probably more expensive than high-end hardware, and this forces deep learning engineers or practitioners to use lower-quality dataset. Anyway, it doesn’t mean excellent deep learning programs can’t be created by such dataset. In particular, dataset preprocessing is equally important, and even engineers need to spend most of time elaborately formulating preprocessing strategies. This study mainly analyzes data and formulates preprocessing schemes of low-quality rock datasets. It aims to make deep learning programs more efficient and general-purpose at the lowest possible cost.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Performance of Space Time Coding in MIMO System—Analysis of Alamouti Space Time Coding Scheme 空时编码在MIMO系统中的应用与性能——Alamouti空时编码方案分析
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060401
Lijun Han, A. Weay, S. Palaniappan
{"title":"Application and Performance of Space Time Coding in MIMO System—Analysis of Alamouti Space Time Coding Scheme","authors":"Lijun Han, A. Weay, S. Palaniappan","doi":"10.23977/jaip.2023.060401","DOIUrl":"https://doi.org/10.23977/jaip.2023.060401","url":null,"abstract":": This research first intuitively shows the implementation diagram of a MIMO system, and then introduces transmission diversity and space-time coding technology, with space-time coding technology belonging to the category of spatial diversity technology. The earliest and most classical Alamouti space-time coding scheme is then applied to MIMO wireless communication systems. The principle of the Alamouti space-time coding scheme is demonstrated, and a theoretical demonstration is carried out in a MIMO diversity system with two transmitters and one receiver. Finally, the Alamouti space-time coding scheme is simulated using MATLAB, and it is verified that the diversity gain and coding gain are obtained by using the Alamouti space-time coding scheme in the MIMO system.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discussion of Practical Application of Virtualization Technology in Computer System 浅谈虚拟化技术在计算机系统中的实际应用
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060207
{"title":"Discussion of Practical Application of Virtualization Technology in Computer System","authors":"","doi":"10.23977/jaip.2023.060207","DOIUrl":"https://doi.org/10.23977/jaip.2023.060207","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Inversion of Damage Incentives of High Pile Wharf in Inland River Based on SEResNet 基于SEResNet的内河高桩码头损伤诱因反演研究
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060409
L. Jia, Cai Fenglin, Zhu Qitao, Yang Tongxin, Zhang Qian
{"title":"Study on Inversion of Damage Incentives of High Pile Wharf in Inland River Based on SEResNet","authors":"L. Jia, Cai Fenglin, Zhu Qitao, Yang Tongxin, Zhang Qian","doi":"10.23977/jaip.2023.060409","DOIUrl":"https://doi.org/10.23977/jaip.2023.060409","url":null,"abstract":": Based on SEResNet neural network algorithm, the inversion model of damage incentives of inland high-piled wharf is constructed. The stress data of pile foundation under the action of damage incentives of high-piled wharf are obtained by using solid element finite element model calculation and indoor model test methods. The parameterized finite element calculation model of high-piled wharf is established by using subprocess in Python program to call MANSYS module, and verified with solid element model. The parameterized simplified finite element model meets the needs of inversion calculation. Based on the stress data samples of the pile foundation of the high-piled wharf obtained from the model test, the inversion analysis of single and multiple damage incentives is carried out. The model can identify the location, size and type of injury causative agent with good generalization ability.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Application of Campus Sports Competition System 校园体育竞赛系统的开发与应用
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060108
{"title":"Development and Application of Campus Sports Competition System","authors":"","doi":"10.23977/jaip.2023.060108","DOIUrl":"https://doi.org/10.23977/jaip.2023.060108","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122856839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A rapid simulation development platform for autonomous driving based on CARLA and ROS 基于CARLA和ROS的自动驾驶快速仿真开发平台
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060303
{"title":"A rapid simulation development platform for autonomous driving based on CARLA and ROS","authors":"","doi":"10.23977/jaip.2023.060303","DOIUrl":"https://doi.org/10.23977/jaip.2023.060303","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Impact of Federated and Transfer Learning on Network Management Systems with Fuzzy DEMATEL Approach 模糊DEMATEL方法下联邦学习和迁移学习对网络管理系统安全性的影响
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060404
S. Turgay, Suat Erdoğan
{"title":"Security Impact of Federated and Transfer Learning on Network Management Systems with Fuzzy DEMATEL Approach","authors":"S. Turgay, Suat Erdoğan","doi":"10.23977/jaip.2023.060404","DOIUrl":"https://doi.org/10.23977/jaip.2023.060404","url":null,"abstract":": Everyday using of the big data, machine learning algorithms, and related studies, ensuring data privacy and security have become a critical necessity. These features make them more vulnerable to cyber-attacks. The security of the stored data is also critical, and evaluating the processing of information in the autonomous network management of these systems. The criteria considers the account in the processing and security of data entering every field from the widespread industry examined. It is necessary to increase their awareness of negative and attack problems while these systems are working. Applications such as traditional machine learning and the use of cloud computing also involve risks regarding data security and personal data leakage. Cooperative learning pays due attention to the confidentiality of sensitive information by keeping the original training data hidden. By collecting, combining, and integrating heterogeneous data with collaborative learning together with a federated learning structure, data produced and stored. This study discusses the effect of federated and transfer learning on autonomous network management analyzes the security status parameters. The fuzzy DEMATEL method was preferred in exploring the parameters affecting the system state according to the degree of importance. Situational scenarios evaluated by considering the structure in which the features of cyber-physical systems examined together with federated learning. Data security factors discussed with the fuzzy DEMATEL","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Method for Pedestrian Recognition Based on Generative Adversarial Networks 基于生成对抗网络的行人识别改进方法
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060204
{"title":"Improved Method for Pedestrian Recognition Based on Generative Adversarial Networks","authors":"","doi":"10.23977/jaip.2023.060204","DOIUrl":"https://doi.org/10.23977/jaip.2023.060204","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Enhancement with Perturbation Method for Multidimensional Grid 多维网格的摄动法隐私增强
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060405
Ilker Ilter, S. Turgay
{"title":"Privacy Enhancement with Perturbation Method for Multidimensional Grid","authors":"Ilker Ilter, S. Turgay","doi":"10.23977/jaip.2023.060405","DOIUrl":"https://doi.org/10.23977/jaip.2023.060405","url":null,"abstract":": With the development of technology, the use of big data is spreading at an increasing rate. The issues of storing, analysing and securing data have brought along the methods that need to be developed. Ensuring data privacy and data security is the case of partial separation and processing of data with the perturbation method of data with the block chain approach. Within the scope of this study, data analysis performed using normalization, geometric rotation, linear regression and scalar data multiplication and comparative classification in precision data mining.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The significance and scope of application of the principle of legality in criminal law 罪刑法定原则在刑法中的意义和适用范围
Journal of Artificial Intelligence Practice Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060406
Yubin Li
{"title":"The significance and scope of application of the principle of legality in criminal law","authors":"Yubin Li","doi":"10.23977/jaip.2023.060406","DOIUrl":"https://doi.org/10.23977/jaip.2023.060406","url":null,"abstract":": This article discusses the significance and scope of application of the principle of legality for crimes and punishments in China. With the development of China's reform and opening up, as well as the socialist market economy, and the strengthening of the foundation of the market economy, it is necessary to further establish and improve the principle of legality in criminal law from the perspective of protecting human rights and limiting the country's punishment power.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信